PROBLEM DEFINITIONS |
||
|---|---|---|
TOP5 Assigned |
||
| Word | Definition | Citation |
| NTFS | (NT file system)Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating such as DOS. | www.5starsupport.com |
| NLR | National LambdaRail (NLR) is a fully operational, national-scale networking infrastructure developed by and for the U.S. high-performance research and education community. NLR provides multiple networks—shared networks, private networks, research networks, production networks, experimental networks—with comprehensive sets of services that are physically and operationally independent from one another on the same nationwide optical fiber footprint. | www.nlr.net |
| Wireless G | A modulation standard for wireless connectivity. Also known as 802.11g | wikipedia.org |
| IDE | (Integrated/Intelligent Drive Electronics). It is an ATA specification (the terms are often used interchangably). This is the most common disk interface for hard drives, CD-ROM drives, etc. It is easy to use, but also the most limited. IDE is integrated into your motherboard. It only allows for 4 devices. The other option is SCSI which is faster, more complicated, and allows for many more devices. SCSI requires a separate add-on card and different types of hard drives (SCSI). | www.basichardware.com |
| Social Engineering | The art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behavior and it is far from foolproof. | www.tekies.com |
TOP5 Unassigned |
||
| Word | Definition | Citation |
| Bit | A bit is a binary digit, taking a value of either 0 or 1. For example, the number 10010111 is 8 bits long. Binary digits are a basic unit of information storage and communication in digital computing and digital information theory. | wikipedia.org |
| Byte | A byte is a series of 8 bits. Also called a character. Computer storage space is measured in bytes. A kilobyte (or 1 KB) represents 1024 bytes. A megabyte (1 MB) represents 1024 KB. A gigabyte represents 1024 MB. | orafaq.com |
| Metadata | Data about data. Index-type information pertaining to the entire data set rather than the objects within the data set. | arizona.edu |
| ARPANet | The precursor to the Internet. Developed in the late 60's and early 70's by the US Department of Defense as an experiment in wide-area-networking to connect together computers that were each running different system so that people at one location could use computing resources from another location. | www.matisse.net |
| DMCA | Digital Millennium Copyright Act Passed in 1998, the DMCA is a bill designed to bring copyright law up to date with digital media. Among other things,it outlaws the manufacture of, or "trafficking" in, technologies capable of circumventing "technical protection measures" used to restrict access to copyrighted works. | arizona.edu |
Validation Results |
||
|---|---|---|
| DOCTYPE | DTD> | Errors |
| Default | Default | 5 |
| Transitional HTML | loose | 4 |
| HTML | strict | 10 |
| XHTML | strict | 121 |
Obviously as the doctype changes so will the definition. Progresively as the the transition to each of the validation standards was applied the amount of error grew. Strict XHTML produced the largest number of errors. Both the HTML standards produced a small number of errors as they are a looser language. The difference between the "quirky" language I used and the XHTML that was required had alot to do with formatting errors. ie where to put the <> and /
|
||
|---|---|---|
| Location | Published Speed | Actual Speed |
| Classroom HCB-315 | 4800 Kbps | 2301.2 Kbps |
| Starbucks on Learning Way | 2400 Kbps | 1566.8 Kbps |
| Strozier-study area 1st floor | 1000 Kbps | 570.2 Kbps |
DEFINITIONS |
||
|---|---|---|
Hardware/Interface |
||
| Word | Definition | Citation |
| CPU | (central processing unti) The central unit in a computer containing the logic circuitry that performs the instructions of a computer's programs. | www.SearchSMB.com |
| Bus | (bidirectional universal switch) A subsystem that transfers data or power between computer components inside or between computers. | www.Wikipedia.org |
| Parallel | An interface for connecting an external device | www.Webopedia.com |
| Serial | A port or interface, that can be used for communication in which only 1 bit is transmitted at a time. | www.Webopedia.com |
| SCSI | (small computer system interface)An intelligent peripheral I/O bus with a device independent protocol. It allows different peripheral devices and hosts to be interconnected on the same bus. | www.Paralan.com |
| RS232 | A common interface standard for data communications equipment. Renamed EIA232 in the early 90's | www.camiresearch.com |
| USB | (universal serial bus)A plug-and-play interface between a computer and add-on devices. | www.SearchSMB.com |
| Hard Drive | A non-volatile data storage device. It is the primary storage unit on a computer | www.Tech-Faq.com |
| Firewire | A high performance networking standard based on a a serial bus architecture similar to USB | www.About.com |
| Floppy Drive | A computer storage read/write device, usually of substantial capacity, which has fixed/permanent surfaces. | www.cs.trinity.edu |
| CD-ROM/RW drive | A computer peripheral that plays back CD-ROMs and--with the right software--audio CDs. | www.CNet.com |
| COM1 | Communication port on a PC that is used for a data communication interface. | www.About.com |
| IDE | (Integrated/Intelligent Drive Electronics). It is an ATA specification (the terms are often used interchangably). This is the most common disk interface for hard drives, CD-ROM drives, etc. It is easy to use, but also the most limited. IDE is integrated into your motherboard. It only allows for 4 devices. The other option is SCSI which is faster, more complicated, and allows for many more devices. SCSI requires a separate add-on card and different types of hard drives (SCSI). | www.basichardware.com |
| IR | Infra Red: Part of electromagnetic waves that is very close to light, but invisible for the human eye. Used for low-rate data transport (eg, remote control signals). | www.streamium.com |
| RF | (radio frequency)Electro-magnetic waves used in radio communications to carry information. | www.bugsweep.com |
Memory/Storage/Data |
||
| Word | Definition | Citation |
| SIMM | (single in-line memory module)A Small circuit board that contains a large number of random access memory chips. An older type of computer memory that uses a 32-bit bus. | www.iWebTool.com |
| DIMM | (dual in-line memory module)A double SIMM. Newer type of memory that has a 64 bit connection. | www.Whatis.com |
| Ram | (random access memory) RAM provides space for your computer to read and write data to be accessed by the CPU. | kb.iu.edu |
| ROM | (read-only memory) It refers to computer memory chips containing permanent or semi-permanent pre-recorded programs. | www.dewassoc.com |
| Virtual Memory | Virtual (or logical) memory is a concept that, when implemented by a computer and its operating system, allows programmers to use a very large range of memory or storage addresses for stored data. The computing system maps the programmer's virtual addresses to real hardware storage addresses. Usually, the programmer is freed from having to be concerned about the availability of data storage. | www.cheap-computers-guide.com |
| Fragmentation | The scattering of data over a disk caused by successive insert, update and delete operations. This eventually results in slow data access times as the disk needs to do more work to construct a contiguous copy of the data on disk. A database reorganization is sometimes required to fix fragmentation problems. | www.orafaq.org |
| Virtual Machine | Software that mimics the performance of a hardware device. For Intel 80386 and higher processors, a virtual machine is protected memory space that is created through the processor's hardware capabilities. | www.microsoft.com |
Software/Coding |
||
| Word | Definition | Citation |
| Desktop | A graphical user interface that is a metaphor used to portray file systems. | www.Webopedia.com |
| Binary Number | A number used in a numeric system which uses two numerals to represent all real numbers. | www.wiseGEEK.com |
| Hexadecimal | A base-16 number system that is used as a more efficient way to visually represent a computer process. | www.iWebTool.com |
| Octet | Eight bits. This term is used in networking, in preference to {byte}, because some systems use the term "byte" for things that are not 8 bits long. | www.Learnthat.com |
| ASCII | (american standard code for information interchange) It is a widely used standard for encoding text documents on computers. | kb.iu.edu |
| Driver | A set of software that contains instructions that allows the computer to communicate with its peripheral devices. | www.angelfire.com |
| OS | (operating system)The foundation software of a machine; that which schedules tasks, allocates storage, and presents a default interface to the user between applications. The facilities an operating system provides and its general design philosophy exert an extremely strong influence on programming style and on the technical cultures that grow up around its host machines. | www.faqs.org |
| NTFS | (NT file system)Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating such as DOS. | www.5starsupport.com |
| FAT | (file allocation table) DOS uses the FAT to manage the disk data area. The FAT tells DOS which portions of the disk belong to each file. The FAT links together all of the clusters belonging to each file, no matter where they are on disk. The FAT is a critical file: you should be sure to back it up regularly. FAT32 is a newer type of FAT that was designed to handle large hard disks. The older FAT (FAT16) can only support partitions up to two gigabytes in size. | www.ontrack.com |
Internet Terms |
||
| Word | Definition | Citation |
| Modem | ((modulator/demodulator)A device that converts the digital signal from a computer to an analogue signal that can be transmitted along an ordinary phone line. This allows computers to connect to the Internet through a telephone line. | www.bized.ac.uk |
| URL | (uniform resource Locator) The location of a file on the Web | www.cites.uiuc.edu |
| URI | (Uniform Resource Identifier) An address for s resource available on the Internet. The first part of a URI is called the "scheme". the most well known scheme is http, but there are many others. Each URI scheme has its own format for how a URI should appear. | www.unitedyellowpages.com |
| Net Neutrality | the principle that basic Internet protocols should be non-discriminatory, esp. that content providers should get equal treatment from internet operators | dictionary.reference.com |
| NIC | Network Interface Card. A plug-in expansion card with a connection for a network cable, or an antenna for wireless transmission. Also called a network adapter card. | www.micro2000uk.co.uk |
| SGML | Standard Generalized Markup Language. SGML is both a language and an ISO standard for describing information embedded within a document. HyperText Markup Language (HTML) is based on the SGML standard. | www.bytowninternet.com |
| HTML | HyperText Markup Language, the coding language used to create hypertext documents for the World Wide Web. In HTML, a block of text can be surrounded with tags that indicate how it should appear (for example, in bold face or italics). Also, in HTML a word, a block of text, or an image can be linked to another file on the Web. HTML files are viewed with a World Wide Web browser. | www.starrsites.com |
| HTTP | (Hypertext Transfer Protocol) is the foundation protocol of the World Wide Web. It sets the rules for exchanges between browser and server. It provides for the transfer of hypertext and hypermedia, for recognition of file types, and other functions. | www.acad.bg |
| XML | Extensible Markup Language. A flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere. XML is a formal recommendation from the World Wide Web Consortium (W3C) similar to the language of today's Web pages, the Hypertext Markup Language (HTML). | www.netproject.com |
| XHTML | XHTML is the next generation of HTML and is a hybrid between HTML and XML. XML was designed to describe data. HTML was designed to display data. XHTML is much stricter than HTML. Not all browers support XML so XHTML provides an intermediary soluton and can be interpreted by XML and HTML browsers. | www.liv.ac.uk |
| ISP | ISP stands for Internet Service Provider. An ISP provides access to the Internet for others via some connectivity service(s). Examples of ISPs include Earthlink, Mindspring, and WorldNet to name a few. | www.1stdomain.net |
| Blog | Blog is short for weblog. A weblog is a journal (or newsletter) that is frequently updated and intended for general public consumption. Blogs generally represent the personality of the author or the Web site. | www.bytowninternet.com |
| Wiki | Wiki is a web application that allows users to add content, as on an Internet forum, but also allows anyone to edit the content. Wiki also refers to the collaborative software used to create such a website | wikipedia.org |
Text/Syntax |
||
| Word | Definition | Citation |
| Font | A graphical design applied to all numerals, symbols and characters in the alphabet. A font usually comes in different sizes and provides different styles, such as bold, italic, and underlining for emphasizing text. | www.relyprint.com |
| Font Family | A collection of alphabets in a similar style but in different weights or classifications. For example, the Garamond font family might include Garamond, Garamond Bold, Garamond Italic, and Garamond Bold Italic. | www.4dimension.com |
| Sans Serif | Typeface that is straight with no serifs or small extensions on letters, generally used for headers. | www.bookzonepro.com |
| Serif | Short cross line at the ends of the stroke of a Roman letter. | www.paperspecs.com |
| Italic/Oblique | The style of letters that slant, in distinction from upright, or roman letters. Used for emphasis within text. | www.c-latitude.com |
| Mono-Spaced | Like typewritten characters, these all have the same width and take up the same amount of space. Use of this type allows figures to be set in vertical rows without leaving a ragged appearance (as opposed to proportional type). | www.proximasoftware.com |
| Proportionally Spaced | Using different widths for different characters | www.webopedia.com |
| Point | a measurement for type. Most books are set in 10 or 11 point type. Twelve points equal one pica em | www.publishers.org.uk |
| Character | A letter, digit or other symbol that is used as the representation of data. A connected sequence of characters is called a character string. | www.flw.com |
| / | (forward-slash)A solidus, oblique or slash, /, is a punctuation mark. It is also called a diagonal, separatrix, shilling mark, stroke, virgule, slant, or forward slash. | wikipedia.org |
| \ | (back-slash) a typographical mark (glyph) used chiefly in computing. Sometimes called a reverse solidus, it is the mirror image of the common slash or solidus. It is also known as a slosh, according to the Macquarie dictionary, rev. 3rd edn (meaning #4). | wikipedia.org |
| @ | (at symbol)a typographic symbol used as an abbreviation for "at" | wikipedia.org |
| ~ | (tilda)The tilde is a grapheme which has several uses, described below. The name of the character comes from Spanish, from the Latin titulus meaning a title or superscription, and is pronounced "TILL-duh" (IPA ) or "TILL-day". It was originally written over a letter as a diacritic (see below), but has since acquired a number of other uses as a character in its own right. In this capacity (especially in lexicography) it is also sometimes known as the swung dash (usually lengthened to ?). | wikipedia.org |
Security |
||
| Word | Definition | Citation |
| Phishing | The act of tricking someone into giving them confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do. For example: sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. | www.stpeterprince.org |
| Worm | A self-replicating destructive program that stands alone and spreads itself through computer networks. | www.psycom.net |
| VPN | Virtual Private Network, a network connected together via securely encrypted communication tunnels over a public network, such as the global Internet | www.smoothwall.net |
| PGP | Pretty Good Privacy - an encryption scheme which uses the "public key" approach - messages are encrypted using the publicly available key, but can only be deciphered by the intended recipient via the private key. | www.geeksnet.com |
| Audit Log | A chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to final results. | www.ucla.edu |
| Availability | Ability of a component or service to perform its required function at a stated instant or over a stated period of time. It is usually expressed as the availability ratio, ie the proportion of time that the service is actually available for use by the Customers within the agreed service hours. | www.dream-catchers-inc.com |
| Buffer Overflow | In computer security and programming, a buffer overflow, or buffer overrun, is a programming error which may result in a memory access exception and program termination, or in the event of the user being malicious, a breach of system security. | en.wikipedia.org |
| Logic Bomb | A malicious computer bug similar to a virus but does not replcate itself. | www.theidm.com |
| Social Engineering | The art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behavior and it is far from foolproof. | www.tekies.com |
| Strong Passwords | Can refer to both a password that is complex, or, more commonly, a password that is both complex AND secure ( that is it contains numbers, letters, and special characters that do not include personal information such as name or birth date. ) The later being the best type of password (complex and secure). | www.albany.edu |
| Confidentiality | Assuring information will be kept secret, with access limited to appropriate persons. | www.tsl.state.tx.us |
| Authentication | The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. | www.saol.com |
| Virus | A piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose. | www.fnb.co.za |
| Firewall | A system or combination of systems that enforces a boundary between two or more networks, ie, an electronic gate that limits access between networks in accordance with local security policy. | www.psycom.net |
| Spam | Any activity designed to trick the search engines into giving a site a higher ranking. Common tactics include hiding keywords as white text on a white page background, submitting a web page to a search engine daily, and building doorway pages. | www.newmediaworldwide.com |
| PKI | Public-key infrastructure is the combination of software, encryption technologies and services designed to protect the security of communications and business transactions on the Internet. | www.dmreview.com |
| Integrity | a real-time operating system (RTOS) produced and marketed by Green Hills Software. It is royalty-free, POSIX-certified, and intended for use in embedded systems needing maximum reliability, availability, and fault tolerance. | en.wikipedia.org |
| Encryption | The process of converting information into a form unintelligible to anyone except holders of a specific cryptographic key | www.sfs.finance.ucla.edu |
Wireless/Networking |
||
| Word | Definition | Citation |
| CVS | The Concurrent Version System, a source-code control system that Xcode can use to manage changes in source code over time and across multiple developers. | www.developer.apple.com |
| Peer-to-Peer | One of the simplest network arrangements, involving linking a series of PCs together without the use of a server. | www.martech-intl.com |
| FTP | File Transfer Protocol. A standard protocol for transferring files between computers over a network. | www.mysouthwest.com |
| Broadband | A broad bandwidth communications channel capable of supporting high capacity ISDN services or other integrated voice, data and video applications. | www.adaptivedigital.com |
| BitTorrent | BitTorrent is a peer-to-peer (P2P) communications protocol for file sharing. The protocol was designed in April 2001 and implemented in Summer 2002 by programmer Bram Cohen, and is now maintained by BitTorrent, Inc. | wikipedia.org |
| Fileserver | A set of disks and processors that make up the majority of the disk space available to a cluster of machines or to a machine such as the SP. Even thought all the machines in a cluster have some local disk space to hold the operating system and temporary files, if a file server is used, all of the nodes can access the data on the file server. At ATS, all user files are stored on a file server both on the RS/6000 Cluster and on the Linux Beowulf cluster. | ucla.edu |
| LAN | Local Area Networks - A network of interconnected computers that is distinguished by its small geographical size (typically measured in meters), privately owned, high-speed (usually measured in megabits per second), and low error rate (typically 1 bit in a trillion). | www.att.com |
| Ethernet | A popular standard (or protocol) for linking computers into a local area network | www.ebusinessnortheast.co |
| NLR | National LambdaRail (NLR) is a fully operational, national-scale networking infrastructure developed by and for the U.S. high-performance research and education community. NLR provides multiple networks—shared networks, private networks, research networks, production networks, experimental networks—with comprehensive sets of services that are physically and operationally independent from one another on the same nationwide optical fiber footprint. | www.nlr.net |
| Protocols | A set of rules for the exchange of information, such as those used for successful data transmission. | www.jpma.com |
| TCP/IP | Transmission Control Protocol/Internet Protocol Transmission Control Protocol/Internet Protocol: This is a common shorthand which refers to the suite of application and transport protocols which run over IP. These include FTP, Telnet, SMTP, and UDP (a transport layer protocol). | www.netserv.ch |
| Client/Server | A networking system in which one or more file servers (Server) provide services; such as network management, application and centralized data storage for workstations (Clients). | usf.edu |
| Backbone | The high-capacity network infrastructure; the part that carries the heaviest traffic. It is also that part of the network that joins local area networks (LANs) together - either inside a building or across the country. | www.telecom-marketing.com |
| Hub | A hub is a communication device that distributes communication to several devices in a network through the re-broadcasting of data that it has received from one (or more) of the devices connected to it. | www.whichvoip.com |
| Router | A device or setup that finds the best route between any two networks, even if there are several networks to traverse. Like bridges, remote sites can be connected using routers over dedicated or switched lines to create WANs | www.wireone.com |
| Switch | A switch is a computer networking device that connects network segments. Low-end network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and a slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. | wikipedia.org |
| Server | A computer or software providing services to remote client machines or applications, such as supplying page contents (texts or other resources) or returning query results. | www.tripod.lycos.co |
| DNS Server | The Domain Name Server resolves the name of the Web site typed into the location field of the browser with the IP address of the server that will send the requested information from that Web site. | businessol.helpserve.com |
| ISP | ISP stands for Internet Service Provider. An ISP provides access to the Internet for others via some connectivity service(s). Examples of ISPs include Earthlink, Mindspring, and WorldNet to name a few. | www.1stdomain.net |
| ASP | Application Service Provider - an organization that hosts software applications on its own servers within its own facilities. Customers access the application via private lines or the Internet. Also called a "commercial service provider." | www.paymentech.com |
| Wireless G | A modulation standard for wireless connectivity. Also known as 802.11g | wikipedia.org |
Web Pages |
||
| Word | Definition | Citation |
| Deprecated | A deprecated element or attribute is one that has been outdated by newer constructs. Deprecated elements are defined in the reference manual in appropriate locations, but are clearly marked as deprecated. Deprecated elements may become obsolete in future versions of HTML. | www.w3.org |
| Element | An element is a piece of data within a document that may contain either text or other subelements such as a paragraph, a chapter, and so on. | www.bureau-cornavin.com |
| Validation | Validating that syntax of element contents is correct (eg YYYY-MM-DD) validating the encoding (eg, XML) | www.dublinscore.org |
| SGML | (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set. Such a specification is itself a document type definition (DTD). SGML is not in itself a document language, but a description of how to specify one. It is metadata. | www.greyfoxwebworks.com |
| XML | (Extensible Markup Language) XML is a standard data format used for text files and information in computer memory that allows easy data processing and exchange between different applications. | www.digitalsignagetoday.com |
| Frameset | An HTML file that defines the layout of a Web page that is composed of other, separate HTML files. | www.ibm.com |
| Strict | Strict HTML - using style sheets for presentation and doing away with tags, align="" attributes and no tags. * XHTML Strict - Use this when you want really clean structural mark-up, free of any tags associated with layout. Use this together with W3C's Cascading Style Sheet language (CSS) to get the font, color, and layout effects you want. | www.everything2.com |
| Attribute | An attribute provides more information about an element such as classification level, unique reference identifiers, or formatting information. | www.opensource.com |
| DTD | Document Type Definition file that specifies how elements inside an XML document should relate to each other. It provides "grammar" rules for an XML document and each of its elements. DLESE's metadata records are XML documents. | www.dlese.org |
| Well-formed | A document is well-formed when it is structured according to the rules defined in Section 2.1 of the XML 1.0 Recommendation. Basically, this definition states that elements, delimited by their start and end tags, are nested properly within one another. | www.orworld.com |
| XHTML | A reformulation of HTML 4.0 as an application of XML. XHTML is a family of current and future DTDs and modules that reproduce, subset, and extend HTML. | www.ibm.com |
| CSS | Cascading Style Sheets. Language used to describe how an HTML document should be formatted. | www.orafaq.com |
| Transitional | The Transitional DTD includes presentation attributes and elements that W3C expects to move to a style sheet. Use this when you need to use HTML's presentational features because your readers don't have browsers that support Cascading Style Sheets (CSS): | www.w3schools.com |
| W3C | World Wide Web Consortium. An international industry consortium which develops common protocols that promote WWW evolution and ensure its interoperability. Standards that have been defined by the W3C include HTML, CSS and XML. | www.calgary-ecommerce-services.com |